Sciweavers

2941 search results - page 567 / 589
» Communication Performance Issues for Two Cluster Computers
Sort
View
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 1 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
GLOBECOM
2009
IEEE
15 years 1 months ago
Coexistence Problem in IEEE 802.22 Wireless Regional Area Networks
IEEE 802.22 wireless regional area network (WRAN) is an emerging cognitive radio-based system. One of the major challenges for WRANs is how to efficiently schedule both channel sen...
Raed T. Al-Zubi, Mohammad Z. Siam, Marwan Krunz
ICIP
1997
IEEE
15 years 1 months ago
Object Based Video with Progressive Foreground
A novel algorithm is described for coding objects in video compression systems which gives complete control over the bit allocation to the video objects. The method is evaluated b...
Donald M. Monro, Huijuan Li, J. A. Nicholls
LREC
2010
164views Education» more  LREC 2010»
14 years 11 months ago
The POETICON Corpus: Capturing Language Use and Sensorimotor Experience in Everyday Interaction
Natural language use, acquisition, and understanding takes place usually in multisensory and multimedia communication environments. Therefore, for one to model language in its int...
Katerina Pastra, Christian Wallraven, Michael Schu...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 9 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine